ProductonDemand
The risk in the global software supply chain
The global digital economy rests upon open source software—yet its maintenance infrastructure remains alarmingly fragile
Software that remains operationally active despite being effectively dead in terms of development and security support
Behind trillions of automated requests lies a remarkably small and fragile human infrastructure
The health and risk profile of the open source projects that power the modern internet
| Technology | Age | Usage Scale | Maintainer Status | Risk Level | Key Vulnerabilities |
|---|---|---|---|---|---|
|
NGINX
|
21 years | 33% of all websites | Corporate (F5) |
|
F5 breach 2024; source code exfiltration |
|
OpenSSL
|
27 years | 87% of HTTPS websites | Professional (14 FTE) |
|
Heartbleed (2014); legacy code weight |
|
cURL
|
29 years | 20+ billion installations | 1 Lead (Sponsored) |
|
Bus factor of one; CVE-2023-38545 |
|
SQLite
|
25 years | 1+ trillion databases | Consortium Model |
|
Closed contribution; fortress model |
|
FFmpeg
|
24 years | YouTube, VLC, browsers | Volunteers + STF |
|
CVE slop conflict; complexity barrier |
|
Log4j
|
23 years | 91% of Java applications | Volunteer |
|
Log4Shell (2021); transitive dependency |
|
zlib
|
30 years | Critical (all major OS) | 2 Primary (Volunteer) |
|
CVE-2023-45853; CVE-2022-37434 |
|
ImageMagick
|
35 years | Web & graphic design | 4-7 Volunteers |
|
ImageTragick RCE; shell injection |
The systemic risks have manifested in catastrophic failures that shook the industry
A sophisticated, multi-year intelligence operation. An attacker ("Jia Tan") spent years building trust, weaponized the maintainer's burnout using sockpuppet accounts, gained co-maintainer status, then inserted a backdoor hidden in binary test files. Discovered by sheer luck when an engineer noticed 500ms SSH latency.
A remote code execution vulnerability in a ubiquitous Java logging framework used by 91% of enterprise applications. Maintained by unpaid volunteers despite being used by trillion-dollar corporations. Many organizations didn't know they used it because it was buried deep in transitive dependencies.
Core-js is a foundational JavaScript library used by over half of the top 10,000 websites, downloaded 250+ million times monthly. Yet its sole maintainer struggled to earn even $400/month. His pleas for help were met with corporate silence or hostility when he tried to monetize via installation messages.
A developer un-published an 11-line package from npm in a trademark dispute. This broke build pipelines at Facebook, Netflix, and thousands of other companies. The incident proved that the supply chain's immutability was a myth—software can simply vanish.
A critical vulnerability in OpenSSL that powers 87% of HTTPS websites, caused by a "bus factor of two" and chronic lack of resources. Exposed the fragility of the internet's cryptographic foundation and catalyzed the Core Infrastructure Initiative.
The maintainers of this critical Go web framework archived the project due to lack of time. This "abandonware" event sent shockwaves through the Go community, forcing companies to fork or migrate. Software doesn't have to be hacked to become a liability—it just needs to be abandoned.
The crisis in open source maintenance is fundamentally a market failure—value is privatized while costs are socialized
Answer these questions to gauge your organization's dependency on open source and exposure to supply chain risks
Strategic approaches for navigating the open source sustainability crisis
How product and technology teams can make dependency management a first-class citizen in planning
Technical debt from open source dependencies is no longer a background concern—it's a strategic risk that demands executive attention and dedicated roadmap allocation. Teams that treat supply chain health as an afterthought will face compounding security, compliance, and operational costs.
We partner with product and technology teams to build roadmaps that forecast open source risk, prioritize technical debt, and plan outcomes with confidence.
The statistics, case studies, and analysis in this report are drawn from peer-reviewed research, industry reports, and primary source documentation from the open source community.